Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 06:33

General

  • Target

    How Catholics Adapt to Changes in China A Missiological Perspective.exe

  • Size

    339KB

  • MD5

    ceaa5817a65e914aa178b28f12359a46

  • SHA1

    534a7ea9c67bab3e8f2d41977bf43d41dfe951cf

  • SHA256

    6c959cfb001fbb900958441dfd8b262fb33e052342948bab338775d3e83ef7f7

  • SHA512

    fef4c0b451d18a9eb73045b3ddcd44450294f06c616cc7175850e6315a6265bd077c8fd09782c486eea624145c7d4c18f8e00a94c0deb394900f9b3e70e60320

  • SSDEEP

    6144:tlsHe0BivO39zYpmH+kAzkA7ZUgbc6AYJ8rEdrEbAgMMV6NX5ZNeVgjYf:InIO39YAeNLFjAYarEdrEb5P6VxY

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.exe
    "C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx

      Filesize

      39KB

      MD5

      b9c4cfefa7917160f4f0aa9d33c36eb1

      SHA1

      01f5b14973d3e29bd091a34df813d4959d2a2893

      SHA256

      a4bfbccb9b567e077d1998cd081df974ebde88ce8f2c8319353fb404a3293a73

      SHA512

      0cdca0417af28bac87499e5d104ddc6fc41b998fa5aea34eaa48101c422cbfa4f1507dbee95963e71846b3036f4940160f013f8d29ba8366e02da45f9275dbed

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      f9678902e1ffa88b1abb89b871ab2e43

      SHA1

      9de5cba2ff777f735e490bcb8b2c24f0d493de6d

      SHA256

      bc5d83b1cdddf82b4476ec907e6c52b89fd9b0a5926fcbd12b82e2689e9f7274

      SHA512

      147386daf1b66ce58ecb256958244dcd0b09ae27672b753a19ce0a1eccabe020c601a15ed761239f87f0952660e2c32c57299aa8a01809c6ed8492bd723dfc63

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2324-0-0x000000002F571000-0x000000002F572000-memory.dmp

      Filesize

      4KB

    • memory/3060-3-0x000000002FD31000-0x000000002FD32000-memory.dmp

      Filesize

      4KB

    • memory/3060-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3060-5-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/3060-27-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/3060-48-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3060-49-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB